Windows relies on various services to keep everything running. These services work together so we can do things like transfer files between computers or perform almost any other operation on a PC.

One of these features is Data Execution Protection, or DEP. It's been around for a few years, but not many people know about it. So, what is it? How does it work? And how can you enable it on your PC? Let's find out.

What is Data Execution Prevention (DEP)?

Data Execution Prevention (DEP) is a security feature built into Windows that helps prevent code from being run in memory regions that are not designated for execution. It prevents code from executing in memory areas marked as non-executable.

This is done by the processor, not by software running on the system. However, it is the operating system – in this case, Windows – that tells the processor to do so. Moreover, DEP can be configured to mark certain areas as read-only or non-executable, depending on the level of protection required.

It does so by creating a routine that allows the computer to scan memory on a schedule. Unless the user has made exceptions, the scan typically covers the entire heap, including the stack.

So this technology allows the operating system to prevent any attacks that might come out of memory, the most common kind of which is a buffer overflow. And DEP makes it easy and effective to prevent those kinds of attacks.

How does Data Execution Prevention (DEP) work?

There are many such precautions for computers, such as firewalls that monitor for malicious activity and block programs from accessing certain areas of a computer, such as memory or the network.

DEP, on the other hand, works a little differently. It doesn't prevent malicious or problematic software from being installed on your computer. Instead, it watches what these programs do. This monitoring allows DEP to stop programs from using all of your memory or using memory unsafely.

How does it do this? Several factors are key.

    1. DEP marks multiple memory locations as non-executable, preventing programs from using that area.
    2. Non-executable memory prevents code from accessing it.
    3. No malicious code/exploit can access this memory segment.
    4. If code or an exploit tries to access the memory region again, the user is notified—allowing firewalls or antivirus software to intervene.

As such, DEP prevents any attempts by memory exploits or malware to access your computer. This keeps malware from interfering with performance or hogging memory bandwidth.

Types of Data Execution Protection

Data Execution Prevention (DEP) works differently on various computers. On most consumer devices, DEP is enforced through a combination of software and hardware. However, they can be implemented separately at times. Consequently, there are two main types of DEP:

  • Hardware-enforced DEP: The computer's processor and BIOS must be compatible with DEP.
  • Software-enforced DEP: This requires a memory protection policy created by the Windows operating system. All versions of Windows starting with Windows XP Service Pack 2 include this feature.

These are the two types of DEP in use, and they are the primary ways that DEP is implemented. In addition, you'll need a processor from Intel or AMD that supports DEP. You should check to see if your computer has this, but it's usually not a problem since they've had DEP-compatible processors for several generations.

How do I find and enable Data Execution Prevention in Windows?

Enabling DEP on Windows is a straightforward and easy process. To activate Data Execution Prevention on your Windows system, you'll need to access the Windows Settings. Here's how to do it:

Step 1. Click the 'Start' button, type View advanced system settings, and open it.

View advanced system settings

Step 2. In the Advanced system settings, click on the Settings tab under the Performance section.

Enter the Settings tab

Step 3: Click on the Performance tab, and then click on the Data Execution Prevention tab.

Click "Data Execution Prevention."

Step 4. For DEP, choose “Turn on DEP for essential Windows programs and services only.”

Enable DEP

5. Or, to disable DEP for specific programs and services, click Turn off Data Execution Prevention for selected programs and services.

This will enable DEP on your computer. However, most modern computers from the last 6-7 years have this feature turned on by default.

Conclusions

These are some of the key elements and aspects of DEP in today's world. It is important to understand that DEP requires compatible software and hardware. However, as mentioned earlier, any computer from the past 5-10 years should not pose an issue.